Instruction manual
Keeping unauthorized third parties from entering the 
system
Issue 9 May 2003
5-9
For DEFINITY G2 and System 85, authorization codes can replace barrier codes 
on incoming remote access facilities or can be used to screen outgoing calls on 
AAR/ARS/WCR trunks. Only authorization codes with the Network Access Flag 
set are permitted to make outgoing calls.
The authorization code option requires that the caller enter a valid authorization 
code to receive switch dial tone. The authorization code used for remote access 
has an FRL value used by AAR/ARS/WCR trunks for outgoing calls [see ‘‘Facility 
restriction level’’ on page 5-19]. Up to 5,000 authorization codes can be issued to 
System 75 R1V3 and DEFINITY G1 users, and up to 90,000 for System 85, 
DEFINITY G2, and G3 users. However, it is best to keep the number of authorized 
users to a minimum.
To maximize the security of the system, follow these steps:
■ When assigning authorization codes, give the users the lowest possible 
FRL needed for their calling requirements.
■ Be sure to remove any unused authorization codes from the system, 
including those assigned to employees who have changed assignments or 
left the company.
■ Assign each authorization code the minimum level of calling permissions 
required.
■ Make authorization codes nonconsecutive (random).
■ Administer each authorization code to the maximum length allowed by the 
system (7 digits).
NOTE:
When a call directed to a VDN points to a vector containing a Route To step, 
and that Route To step attempts to utilize an authorization code, the call will 
be denied.
Feature access code administration
Certain feature access codes may facilitate egress from the system and should be 
used with care. These include: Data Origination, Data Privacy, Data Restriction, 
Abbreviated Dialing, ARS/AAR, Call Forwarding, and Facility Test Calls.
Trunk administration
When trunk groups are administered, they are assigned a Trunk Access Code 
(TAC). Unless they are needed, prohibit both direct-dial access and facility test 
call access to trunk groups. This prevents callers from using TACs to obtain an 
outgoing trunk.










